Create Interactive Tour

Windows Analysis Report
wsl-gvproxy.exe

Overview

General Information

Sample Name:wsl-gvproxy.exe
Analysis ID:781501
MD5:0f9947ddab6bf8d7a6b350ec8395985e
SHA1:9548a4ec9b2aa36c1c37637137f6abddb57fd111
SHA256:e9ca88be09c6d5abdafd569f470bce9a1bf15753566a05fe070f54c8240c12c5
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

PE file contains more sections than normal
Potential time zone aware malware
Program does not show much activity (idle)
PE file contains sections with non-standard names

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • wsl-gvproxy.exe (PID: 4536 cmdline: "C:\Users\user\Desktop\wsl-gvproxy.exe" -install MD5: 0F9947DDAB6BF8D7A6B350EC8395985E)
  • wsl-gvproxy.exe (PID: 2228 cmdline: "C:\Users\user\Desktop\wsl-gvproxy.exe" /install MD5: 0F9947DDAB6BF8D7A6B350EC8395985E)
  • wsl-gvproxy.exe (PID: 2148 cmdline: "C:\Users\user\Desktop\wsl-gvproxy.exe" /load MD5: 0F9947DDAB6BF8D7A6B350EC8395985E)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: wsl-gvproxy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: wsl-gvproxy.exeStatic PE information: Number of sections : 13 > 10
Source: wsl-gvproxy.exeStatic PE information: Section: /19 ZLIB complexity 0.9986632986706689
Source: wsl-gvproxy.exeStatic PE information: Section: /32 ZLIB complexity 0.9926382211538461
Source: wsl-gvproxy.exeStatic PE information: Section: /65 ZLIB complexity 0.9985654182370184
Source: wsl-gvproxy.exeStatic PE information: Section: /78 ZLIB complexity 0.9889807084837545
Source: wsl-gvproxy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\wsl-gvproxy.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: wsl-gvproxy.exeString found in binary or memory: entersyscallentrust-aaasentrust-aamsentrust-kmshexasoftport1ezmessagesrvfacilityviewfaxstfx-portfcopy-serverfcp-cics-gw1ferrari-foamfg-sysupdatefinalizeOncefjappmgrbulkfjippol-cnslfjitsuappmgrfont-serviceforesyte-secfujitsu-neatfunk-dialoutfunk-licensegalaxy7-datagcBitsArenasgcpacertracegenisar-portgeognosismangetaddrinfowglobal-wlinkglobecast-idgnutella-rtrgnutella-svcgre-udp-dtlsgridgen-elmdgw-call-porth323gatedisch323gatestath323hostcallhacl-monitorharddecommithfcs-managerhhb-handheldhiperscan-idhmac-sha1-96hmac-sha256.host is downhp-alarm-mgrhp-collectorhpvmmcontrolhttp2debug=1http2debug=2hub-open-nethypercube-lmias-neighboriatp-highpriibm-dial-outibm-mqseriesibridge-dataibridge-mgmtice-locationicl-twobase1icl-twobase2icl-twobase3icl-twobase4icl-twobase5icl-twobase6icl-twobase7icl-twobase8icl-twobase9icmpv6Filterieee-mms-sslifsf-hb-portillegal seekimoguia-portinfo requestintel-rci-mpinterintelliintrepid-sslinvalid argsinvalid baseinvalid portinvalid slotinvalid typeio-dist-dataip-provisionipcs-commandiphlpapi.dllipv6HopLimitiscsi-targetiss-mgmt-sslitu-bicc-stciuhsctpassocivs-databasejaxflow-datajeol-nsddp-1jeol-nsddp-2jeol-nsddp-3jeol-nsddp-4jeol-nsdtp-1jeol-nsdtp-2jeol-nsdtp-3jeol-nsdtp-4jetcmeserverjmq-daemon-1jmq-daemon-2kentrox-protkerberos-admkernel32.dllkexDHInitMsgkey exchangelanmessengerlanrevserverlbc-watchdoglfstack.pushlibelle-disclisp-controllistcrt-portlistmgr-portlm-perfworkslogrus_errorlontalk-normmadvdontneedmagiccontrolmanyone-httpmatip-type-amatip-type-bmax-forwardsmaxMonotonicmc-appservermcns-tel-retmcs-fastmailmctet-mastermercury-discmetatude-mdsmgcp-gatewaymheapSpecialmicrocom-sbpmicromuse-lmmicrosoft-dsmillisecondsmindarray-camnp-exchangemobrien-chatmortgagewaremppolicy-mgrms-licensingms-streamingmsfw-controlmsfw-replicamsfw-storagemspanSpecialmtcevrunqmanmti-tcs-commmulticastTTLmvs-capacitymyq-termlinknas-meteringnav-data-cmdncacn-ip-tcpncadg-ip-udpncdmirroringnec-raidplusnetapi32.dllnetbill-authnetbill-crednetbill-prodnetconf-beepnetdb-exportnetiq-qchecknetop-schoolnetspeak-acdnetspeak-cpsnettgain-nmsnetworklenssnetxms-agentneverofflinenewlixconfignewlixenginenexus-portalnicetec-mgmtnim-vdrshellnimbusdbctrlnimrod-agentno such fileno such hostnod-providernot pollablenovar-globalnovell-lu6-2npds-trackernssocketportnucleus-sandoceansoft-lmoemcacao-rmioffice-toolsomabcastltkmonehome-helpoob-ws-httpsopalis-robotopennl-voiceopenstack-idopsmessagingorbix-configorbplus-iioporigo-nativeosmosis-aeeaovrimosdbmanovsessionmgrp-net-remotep2pcommunitypassword-chgpatrol-mq-gmpatrol-mq-nmpay-per-viewpcsync-httpspictrographypkix-3-ca-raplaysta2-appplaysta2-lobplysrv-httpspmsm-webrctlpn-requesterpolicyserverpowergemplusppactivationprecise-commprism-deployprofinet-rtmprosharedatapt2-discoverqb-db-serverqsnet-assistqsnet-workstraceFiniLockrdb-dbs-dispreadShutdownrecentTSTimeredwood-chatreflect.Copyreleasep: m=remotedeployresource-mgrretransmitTSrjcdb-vcardsrobot-remoterpki-rtr-tlsrsa-sha2-256rsa-sha2-512rsisysaccessrsvp-encap-1rsvp-encap-2
Source: wsl-gvproxy.exeString found in binary or memory: .WithDeadline(169.254.0.0/161907348632812520060102150405802.1P VLAN ID95367431640625: extra text: <not Stringer>ANINetworkNameAccept-CharsetAccess-RequestAcct-AuthenticAuthenticationAuto-ConfigureBad TruncationBoot File SizeCHAP-ChallengeCLICOLOR_FORCECertCloseStoreChallenge textChecksumErrorsCiscoDiscoveryClosedReceiverCluster ReportCoInitializeExCoUninitializeCodeEDNSKeyTagContent-LengthControlServiceCounter SampleCreateEventExWCreateMutexExWCreateProcessWCreateServiceWCryptGenRandomDNSKEY MissingDSA-NSEC3-SHA1Dkim-SignatureDot11CtrlCFEndDot11DataCFAckERSPAN Type IIExtensionsPathFMS DescriptorFastRetransmitFindFirstFileWFormatMessageWFramed-RoutingGC assist waitGC worker initGET_DESCRIPTORGetConsoleModeGetProcAddressGetShellWindowGetTickCount64GetUserNameExWHostPrecedenceICMPv6RedirectIEEE 1394.1995INTERNAL_ERRORIPv6PacketInfoImpress ServerInputInterfaceInstEmptyWidthInterface NameIsWellKnownSidIsWow64ProcessLiebDevMgmt-DMListening on: LoadLibraryExWLogin-LAT-NodeLogin-LAT-PortLogin-TCP-PortMAX_FRAME_SIZEMB; allocated MakeAbsoluteSDMalformedQueryManagement MICMaxPayloadSizeMoSIPv6AddressModule32FirstWMultiple BSSIDNAS-IP-AddressNAS-IdentifierNeighborState(NetUserGetInfoNot AcceptableOVSDP CountersOpenSCManagerWOther_ID_StartPPPoEDiscoveryPROTOCOL_ERRORPS-Capture-ProPassword-RetryPattern_SyntaxPendingBufUsedPort ComponentPowerAlert-nsaProcess32NextWProtocol HelloQOS CapabilityQuery End TimeQuotation_MarkRCodeNameErrorRDNSSSelectionREFUSED_STREAMREQUEST_METHODRIC DescriptorRRSIGs MissingRTTMeasureTimeReceivedBlocksRegSetValueExWSCTPCookieEchoSCTPEmptyLayerSET_DESCRIPTORSet the subnetSetConsoleModeSetFilePointerSetThreadTokenSignal QualitySizeofResourceSourceIsolatedSpare Pair POEStandard SFlowTCPRcvBufStateTCPSenderStateTCPSndBufStateTimestampReplyTranslateNameWUSB < 40 bytesUnknown methodUnknown reasonUnknownPPPTypeVerQueryValueWVirtualProtectVirtualQueryExWNM-Sleep Mode[%s %p] %s:
Source: wsl-gvproxy.exeString found in binary or memory: 0123456789ABCDEFX0123456789abcdefx060102150405Z070011920928955078125596046447753906255a:94:ef:e4:0c:dd5a:94:ef:e4:0c:ee: missing method AES-HMAC-SHA1-128ALLOW_NEW_SOURCESAP Channel ReportARP Cache TimeoutAcct-Input-OctetsAcct-Session-TimeAdjustTokenGroupsAgere ProprietaryAntenna Sector IDBLOCK_OLD_SOURCESBayStack EthernetBroadcast AddressCDP TLV < 4 bytesCOMPRESSION_ERRORCalled-Station-IdCertFindExtensionChassis ComponentCiena CorporationClient identifierCryptDecodeObjectCtrlPowersavePollDHCP Message TypeDataQOSDataCFPollDiagnostic ReportDnsRecordListFreeDot11CtrlBlockAckDot11CtrlCFEndAckDot11MgmtProbeReqEFI RISC-V 32-bitEFI RISC-V 64-bitEFI Sunway 32-bitEFI Sunway 64-bitENHANCE_YOUR_CALMERP Information-2ETHERNET-ISO88023Ethernet and FDDIExcessiveTimeSkewExtended BSS LoadExtended ScheduleFLE Standard TimeFailed DependencyFramed-IP-AddressFramed-IP-NetmaskGC assist markingGET_CONFIGURATIONGMT Standard TimeGTB Standard TimeGate AnnouncementGetCurrentProcessGetShortPathNameWHEADER_TABLE_SIZEHTTP_1_1_REQUIREDHasIPv6PacketInfoIPv4Option(%v:%v)ISO88024-TOKENBUSIf-Modified-SinceIntel Lean ClientInvalid level: %dIsForwardedPacketIsTokenRestrictedKerberosRealmNameLeasequeryRelayIDLink State UpdateLogin-LAT-ServiceLookupAccountSidWMoSDomainNameListMoved PermanentlyNetBiosOverTCPDDSNetworkPacketInfoNo AuthenticationNot AuthoritativeOPTera Metro 3500Old_North_ArabianOld_South_ArabianOther_ID_ContinuePacketTooBigCountPower consumptionQBSS Load ElementQueryWorkingSetExReadProcessMemoryReconfigureAcceptRegLoadMUIStringWRemoteLinkAddressRoot AnnouncementS46PortParametersSACKScoreboard: {SET_CONFIGURATIONSLP Service ScopeSentence_TerminalServer IdentifierSignature ExpiredStreetTalk ServerSubnet AllocationSystemFunction036TXOP doze allowedToo Many RequestsTransfer-EncodingTunnel-PreferenceUnified_IdeographUnknownIPProtocolWSAEnumProtocolsWWTSQueryUserTokenWantZeroRcvWindowWiegand Interface
Source: wsl-gvproxy.exeString found in binary or memory: /go/pkg/mod/gvisor.dev/gvisor@v0.0.0-20220908032458-edc830a43ba6/pkg/state/addr_set.go
Source: wsl-gvproxy.exeString found in binary or memory: /go/pkg/mod/gvisor.dev/gvisor@v0.0.0-20220908032458-edc830a43ba6/pkg/tcpip/stack/addressable_endpoint_state.go
Source: classification engineClassification label: clean2.winEXE@3/0@0/0
Source: unknownProcess created: C:\Users\user\Desktop\wsl-gvproxy.exe "C:\Users\user\Desktop\wsl-gvproxy.exe" -install
Source: unknownProcess created: C:\Users\user\Desktop\wsl-gvproxy.exe "C:\Users\user\Desktop\wsl-gvproxy.exe" /install
Source: unknownProcess created: C:\Users\user\Desktop\wsl-gvproxy.exe "C:\Users\user\Desktop\wsl-gvproxy.exe" /load
Source: wsl-gvproxy.exeStatic file information: File size 12012032 > 1048576
Source: wsl-gvproxy.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: wsl-gvproxy.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x367400
Source: wsl-gvproxy.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x43ec00
Source: wsl-gvproxy.exeStatic PE information: Raw size of /65 is bigger than: 0x100000 < 0x12a800
Source: wsl-gvproxy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: wsl-gvproxy.exeStatic PE information: section name: /4
Source: wsl-gvproxy.exeStatic PE information: section name: /19
Source: wsl-gvproxy.exeStatic PE information: section name: /32
Source: wsl-gvproxy.exeStatic PE information: section name: /46
Source: wsl-gvproxy.exeStatic PE information: section name: /65
Source: wsl-gvproxy.exeStatic PE information: section name: /78
Source: wsl-gvproxy.exeStatic PE information: section name: /90
Source: wsl-gvproxy.exeStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\wsl-gvproxy.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\wsl-gvproxy.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\wsl-gvproxy.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\wsl-gvproxy.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\wsl-gvproxy.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\wsl-gvproxy.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\wsl-gvproxy.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
Source: C:\Users\user\Desktop\wsl-gvproxy.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: wsl-gvproxy.exeBinary or memory string: github.com/containers/gvisor-tap-vsock/pkg/tap.(*qemuProtocol).Stream
Source: wsl-gvproxy.exeBinary or memory string: github.com/containers/gvisor-tap-vsock/pkg/tap.(*qemuProtocol).Write
Source: wsl-gvproxy.exeBinary or memory string: traceroutetransPrototreehoppertrim-eventtriomotionttntspautotupleEntryudrawgraphunicontrolunifyadminunixpacketunknown pcunknown_caupnotifypsups-engineuser-agentuser32.dllva-pacbasevacdsm-appvacdsm-swsvalisys-lmvaradero-0varadero-1varadero-2vergencecmvideobeansvipera-sslvirprot-lmvisweathervmware-fdmvnwk-prapivoxelstormvrcommercevsnm-agentwap-vcal-swbem-httpswcr-remlibwebemshttpwebmachinewebobjectswhosockamiwimaxasncpwinpharaohws2_32.dllwsdl-eventwsm-serverwssauthsvcwv-csp-smsx-bone-apix-bone-ctlx2-controlxmlblasterxn-controlxserveraidxsum: 0x%xxw-controlxyplex-muxzephyr-cltzephyr-srvzieto-sockzigbee-ips of size (targetpc= , plugin: KiB work, exp.) for freeindex= gcwaiting= idleprocs= in status mallocing= ms clock, nBSSRoots= p->status= s.nelems= schedtick= span.list= timerslen=%d.%d.%d.%d, elemsize=, npages = , truncated.WithCancel/dev/stderr/dev/stdout/forwarder//index.html305175781253m-image-lm4-tieropmgw802-11-iapp: frame.sp=;; opcode: AES-128-CBCAES-192-CBCAES-256-CBCARPTrailersAS SequenceAUTHORITY: AltChecksumAlteon 180eBLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s-256BackupWriteBad GatewayBad RequestBootFileURLBootRequestCallback-IdClassHESIODCloseHandleCoGetObjectCodePaddingCopiedBytesCreateFileWCtrlWrapperDMS RequestData SourceDataMissingDataQOSDataDataQOSNullDatagramMTUDeleteFileWDives_AkuruDomain NameDupAckCountEAP-MessageEFI ItaniumENABLE_PUSHEND_HEADERSESTABLISHEDEarly HintsEchoRequestEgressRouteElapsedTimeEndSequenceEnergy WiseEnumWindowsEthernetCTPExitProcessFMS RequestFRAME-RELAYFlow SampleFrame RelayFramed-PoolFreeLibraryFull DuplexGOTRACEBACKGeolocationGetFileTypeHTTPS_PROXYHasHopLimitHostUnknownIPv6RoutingIdeographicIn-Reply-ToInfoRequestInstCaptureInstRuneAnyIntel x86PCInterfaceIDInvalidArgsInvalidatedKerberosKDCLQStartTimeLeave GroupLinkAddressLoST ServerMAC AddressMCSIndex#%dMPLSUnicastMarshalJSONMarshalTextMaxDHCPSizeMeasureTimeMedefaidrinMessageBoxWMessageTypeMobilitySrvMoveFileExWNAS-Port-IdNDS ContextNDS ServersNNTP ServerNTP ServersName ServerNandinagariNative VLANNetShareAddNetShareDelNew_Tai_LueOPTera 8003Old_PersianOld_SogdianOpenProcessOutstandingPTI ControlPacketsSentPau_Cin_HauProxy-StateQoS Map SetRapidCommitRcvBufStateRcvWndScaleReconfigureRegCloseKeyRetransmitsReturn-PathS64PrioritySCTPInitAckSET_ADDRESSSET_FEATURESHA-512/224SHA-512/256SIP ServersSMTP ServerSNTPServersSerial LineSet the MTUSetFileTimeShutdownAckSignWritingSndBufStateSndWndScaleSoft_DottedSolicitAddrStaticRouteStatus CodeSubnet MaskSwap ServerSwitch NodeSystem NameTCPRTTStateTFS RequestTPC RequestTTLExceededTime OffsetTime ServerTunnel-TypeUNKNOWN(%d)USERPROFILEUnknown DIDUnknown(%d)UnspecifiedVendorClassVirtualFreeVirtualLockWSARecvFromWarang_CitiWhite_SpaceWindowScaleWriteClosedWriteErrorsXFontServer[:^xdigit:]
Source: wsl-gvproxy.exeBinary or memory string: /go/pkg/mod/github.com/containers/gvisor-tap-vsock@v0.4.1-0.20221117045408-8fa817ade332/pkg/virtualnetwork/qemu.go
Source: wsl-gvproxy.exeBinary or memory string: github.com/containers/gvisor-tap-vsock/pkg/virtualnetwork.(*VirtualNetwork).AcceptQemu
Source: wsl-gvproxy.exeBinary or memory string: AcceptQemu
Source: wsl-gvproxy.exeBinary or memory string: github.com/containers/gvisor-tap-vsock/pkg/tap.(*qemuProtocol).Buf
Source: wsl-gvproxy.exeBinary or memory string: *tap.qemuProtocol
Source: wsl-gvproxy.exeBinary or memory string: 9qemuu
Source: wsl-gvproxy.exeBinary or memory string: github.com/containers/gvisor-tap-vsock/pkg/tap.(*qemuProtocol).Read
Source: wsl-gvproxy.exeBinary or memory string: @ %v MB, and cnt= max= ms, ptr tab= top=%.1f %d %d%s*%d%s-%d%s/%d%s/%s%s:%d%s:%s%s=%s%s=%x%v:%v%v%s&#34;&#39;&amp;(end)+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp/dhcp156252ping3exmp3l-l13link4talk78125:path<nil>AFSDBATM 2ATM 3AbortAdlamAlertAprilBOUNDBamumBatakBuhidCCNewCLASSCNAMECSYNCCauseChaosClassCubicDHCIDDNAMEDebugDograDot11Dot1QE.163EAPOLECDSAED448ERROREUI48EUI64ErrorFRAG,FatalFirstFlagsFoundGFSK,Ghz2,Ghz5,GreekH.248H.323HINFOHTTPSHelloHook(IA_NAIA_TAISPKIKhmerLatinLimbuLocalMAILAMAILBMAPOSMINFOMarchNAPTRNICIDNINFONSEC3NoACKNoiseNushuOFDM,OFFEROfferOghamOriyaOsageOtherOwnerP-224P-256P-384P-521PFLogPPPoEPRACKPrismQUERYQueryQuietREFERRRSIGRangeRealmRenewReordReplyRulesRunicS46BRSFlowSHA-1SIMCOSSHFPSTermStartStateTSEcrTSValTakriTamilTypeAU-PIDUINFOVXLAN\u202] = (a1-bsaboutaccelackedacnetacpltacteradrepads-caesopafrogagcatagslbaisesalarmalfinaliasallowalpesaltcpamqpsaol-1aol-2aol-3apdapapocdarcpdarrayasdisasmpsauditaurisavianayiyaazetiaztecbabelbbarsbeorlbh611bhfhsbhmdsbinkpblazebmdssbonesbpdbmbrainbrucebv-dsbv-isbytexcamaccandpcawasccmadcft-0cft-1cft-2cft-3cft-4cft-5cft-6cft-7chunkclockclosecnhrpcoapscosircountcoviacpdlccppdpcsms2csrpccubiccvmoncvsupd-s-ndbasedbrefdebugdecapdeferdelaydemuxdicomdixiedmididns: dnsixdomiqdrwcsdsatpdsfgwe-mdue-nete-woaeapspecommeenetelcsdemwinepmaperroretb4jetftpeventewallewdgseyetvfalsefamdcfaultfemisff-smflagsflcrsfloatfmsasfodmsfoundfpitpftsrvg2taggFreegcinggenieghvpnginadglobeglrpcgolemgraspgrcmpgrubdgscangtauagv-pfgv-ushchanhelixhellohivephpiodhpssdhttpshttpxhuskyhydaphydraiRAPPiclidicmpdiconpicppsicpv2identigridimap2imap3imapsiminkimprsinedoinit insisint16int32int64ipassipcd3ipfixirdmiirisais99cis99siscsiitachitalkitosejoostjsteljt400kazaakdnetkioskkitimldapsleoiplevellightllmnrloginlutaplutcplv-jcm-wnnmailqmanetmatchmc3ssmcftpmcntpmeta5metermheapmikeymimermmcalmmpftmollymonthms-lamsfrsmsimsmsyncmumpsmuninmysqlnacnlncu-1ncu-2ncxcpndmpsneo4jneod1neod2netcpnetehnetgwnetiqnetmlnfapingr-tnicIDnimshninafnntpsnomadnomdbnppmpnq-apnsrmpnsstpntalkntohsnusrpnuxslnxlmdobrpdoc-lmodnspoidsromsdkonmuxorionosautosdcpotherovbusovobsovsdbovwdbownerpacompanicparsepcoippdnetperfdpipesplatopointpop3sppsmspressprsvppwdisq3adeqencpqmtpsqotpsqsoftquakequbesquosaqwaveradioradixrangerazorrdlapre101rebolredisreplyrfilerimslripngrmlnkrnmaprobixrootdrsf-1rsmtprsyncrtspsrune rushdrxapirxmons-bfds-netsaismsapv1sarissbcapsbookscav schedscscpsdmmpsenipsf-lmsflowsg-lmsgcipsgsapshellshilpsicctsievesimcosimonsleepsliceslmapslsccslushsmilesmptesmsqpsmwansnapdsnappsnaresockssolvesonarsonusspicespikespockspocpsruthss7nssscanssdtpsse41sse42ssmppssripssse3stackstarsstatestatsstdiostunssudogsuucpsvdrpsvnetswa-1swa-2swa-3swa-4swarmswdtpsweepswrmitbrpftempotexaitexartext/tftpsthrtxtigv2timedtotaltracetracktripetrofftsilbtupletvbustwcsstwrpcuadtcuarpsudp: uint8unifyuniteupdogus-gvusageutf-8utimevaluevchatvemmivenusvm-ipvmnetvmrdpvmsvcvnetdvracevslmpvstatvtsasvxlanweavewebsmwellowillywindbwinfswinrmwired
Source: wsl-gvproxy.exeBinary or memory string: go.itab.*github.com/containers/gvisor-tap-vsock/pkg/tap.qemuProtocol,github.com/containers/gvisor-tap-vsock/pkg/tap.protocol
Source: wsl-gvproxy.exe, 00000000.00000002.265475175.000001754C504000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: wsl-gvproxy.exe, 00000001.00000002.274139731.000001AD21698000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllpp
Source: wsl-gvproxy.exe, 00000002.00000002.289781729.000001760B579000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlloo
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
Path Interception1
Process Injection
1
Software Packing
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 781501 Sample: wsl-gvproxy.exe Startdate: 10/01/2023 Architecture: WINDOWS Score: 2 4 wsl-gvproxy.exe 2->4         started        6 wsl-gvproxy.exe 2->6         started        8 wsl-gvproxy.exe 2->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
wsl-gvproxy.exe3%ReversingLabs
wsl-gvproxy.exe1%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:781501
Start date and time:2023-01-10 14:45:41 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 14s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:wsl-gvproxy.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run name:Cmdline fuzzy
Number of analysed new started processes analysed:14
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:CLEAN
Classification:clean2.winEXE@3/0@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 100% (good quality ratio 100%)
  • Quality average: 75.8%
  • Quality standard deviation: 24.4%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com
  • Execution Graph export aborted for target wsl-gvproxy.exe, PID 4536 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):6.8198074684398335
TrID:
  • Win64 Executable (generic) (12005/4) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:wsl-gvproxy.exe
File size:12012032
MD5:0f9947ddab6bf8d7a6b350ec8395985e
SHA1:9548a4ec9b2aa36c1c37637137f6abddb57fd111
SHA256:e9ca88be09c6d5abdafd569f470bce9a1bf15753566a05fe070f54c8240c12c5
SHA512:428bf2fea13548c0e042c2cc7dde3bfc2ee38142204f9498f8cb675321cce939e49170c8411a20d48006c2182873cba6588b08632caa5ddc2c61f31b241046b0
SSDEEP:98304:indCyJd00B5ZxGxEeeIspHl76aBCwfjdziAz8aJhEJYl4l2jQ0Rsf4m/eC:i5JdZlzFnImj0W8ElRCn
TLSH:EDC67B47F85445E4CAE9C230C9A542627B717C894B207BC73B10BB793AB7BD46B7A390
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........B...0...."......t6.........@D........@..............................@1...........`... ............................
Icon Hash:00828e8e8686b000
Entrypoint:0x464440
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:1
File Version Major:6
File Version Minor:1
Subsystem Version Major:6
Subsystem Version Minor:1
Import Hash:9cbefe68f395e67356e2a5d8d1b285c0
Instruction
jmp 00007F696CC80E80h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
pushfd
cld
dec eax
sub esp, 000000E0h
dec eax
mov dword ptr [esp], edi
dec eax
mov dword ptr [esp+08h], esi
dec eax
mov dword ptr [esp+10h], ebp
dec eax
mov dword ptr [esp+18h], ebx
dec esp
mov dword ptr [esp+20h], esp
dec esp
mov dword ptr [esp+28h], ebp
dec esp
mov dword ptr [esp+30h], esi
dec esp
mov dword ptr [esp+38h], edi
movups dqword ptr [esp+40h], xmm6
movups dqword ptr [esp+50h], xmm7
inc esp
movups dqword ptr [esp+60h], xmm0
inc esp
movups dqword ptr [esp+70h], xmm1
inc esp
movups dqword ptr [esp+00000080h], xmm2
inc esp
movups dqword ptr [esp+00000090h], xmm3
inc esp
movups dqword ptr [esp+000000A0h], xmm4
inc esp
movups dqword ptr [esp+000000B0h], xmm5
inc esp
movups dqword ptr [esp+000000C0h], xmm6
inc esp
movups dqword ptr [esp+000000D0h], xmm7
dec eax
sub esp, 30h
dec ecx
mov edi, eax
dec eax
mov edx, dword ptr [00000028h]
dec eax
cmp edx, 00000000h
jne 00007F696CC84B2Eh
dec eax
mov eax, 00000000h
jmp 00007F696CC84BA5h
dec eax
mov edx, dword ptr [edx+00000000h]
dec eax
cmp edx, 00000000h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x12370000x47c.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x12380000x1a672.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x7a87200x140.data
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x3673780x367400unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x3690000x43eaf00x43ec00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x7a80000x7d51e00x3e200unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
/40xf7e0000x1270x200False0.6171875data5.097874074212899IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/190xf7f0000x91b870x91c00False0.9986632986706689data7.997026581242689IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/320x10110000x1eda20x1ee00False0.9926382211538461data7.9398790238695165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/460x10300000x2a0x200False0.091796875data0.7372102088396265IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/650x10310000x12a7bc0x12a800False0.9985654182370184data7.998514343936583IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/780x115c0000xad0750xad200False0.9889807084837545data7.995827112152604IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/900x120a0000x2c3c30x2c400False0.9726617673022598data7.805660215103653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.idata0x12370000x47c0x600False0.3333333333333333data3.676383301892774IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x12380000x1a6720x1a800False0.1812168337264151data5.452686676824189IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.symtab0x12530000xc06d80xc0800False0.1761109983766234data5.441444102535306IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:14:46:36
Start date:10/01/2023
Path:C:\Users\user\Desktop\wsl-gvproxy.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\wsl-gvproxy.exe" -install
Imagebase:0xd10000
File size:12012032 bytes
MD5 hash:0F9947DDAB6BF8D7A6B350EC8395985E
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

No disassembly